Estudo de caso

From UAV to VR in No Time: Autodesk® ReCap™ Photo Quickly Renders 3D Structures Thanks to Multicore Scalability

Creating 3D models of an outdoor scene for use in architecture, engineering, and construction is now easier and faster than ever with the help of UAVs, Autodesk ReCap Photo, and high-core-count Intel Xeon processors. Businesses in these sectors can take advantage of the new speed, ease, and availability of 3D modeling based on photogrammetry to meet more deadlines, speed construction time, improve design through better visualizations, and gain competitive advantage.
  • Parceiros
  • Profissional
  • Professores
  • Realidade aumentada
  • Visão computacional
  • Gráficos
  • Realidade combinada
  • Realidade virtual
  • Lab7Systems Helps Manage an Ocean of Information

    Finding efficient ways to manage the massive amounts of data generated by new technologies is a key concern for many industries. It’s especially challenging in the world of life sciences, where research breakthroughs are based on an ever-expanding ocean of information.

  • Modernização de código
  • Intel® Parallel Studio XE
  • Intel® Parallel Studio XE Cluster Edition
  • Intel® Parallel Studio XE Composer Edition
  • Intel® Parallel Studio XE Professional Edition
  • SoftLab-NSK Builds a Universal, Ultra HD Broadcast Solution

    SoftLab-NSK develops complete TV broadcast automation solutions that work with the 4K format and HEVC compression and include functionality for video encoding. When the company wanted to expand its flagship Forward T* line of playout servers, it needed the most efficient solution for video transcoding.

  • Processamento de mídia
  • Power System Infrastructure Monitoring Using Deep Learning on Intel® Architecture

    This paper evaluates the performance of Intel® Xeon® processor powered machines for running deep learning on the GoogleNet* topology (Inception* v3). The functional problem tackled is the identification of power system components such as pylons, conductors, and insulators from the real-world video footage captured by unmanned aerial vehicles (UAVs) or commercially available drones.
  • Profissional
  • Professores
  • Estudantes
  • Linux*
  • Inteligência Artificial
  • Python*
  • Intermediário
  • TensorFlow*
  • Unattended Baggage Detection Using Deep Neural Networks in Intel® Architecture

    In a world becoming ever more attuned to potential security threats, the need to deploy sophisticated surveillance systems is increasing. An intellectual system that functions as an intuitive “robotic eye” for accurate, real-time detection of unattended baggage has become a critical need for security personnel at airports, stations, malls, and in other public areas. This article discusses inferencing a Microsoft Common Objects in Context (MS-COCO) detection model for detecting unattended baggage in a train station.

  • Profissional
  • Professores
  • Estudantes
  • Linux*
  • Inteligência Artificial
  • Intermediário
  • Caffe*
  • Aprendizado de máquina
  • Segurança
  • Profiling Tensorflow* workloads with Intel® VTune™ Amplifier

    Machine learning applications are very compute intensive by their nature. That is why optimization for performance is quite important for them. One of the most popular libraries, Tensorflow*, already has an embedded timeline feature that helps understand which parts of the computational graph are causing bottlenecks but it lacks some advanced features like an architectural analysis.

  • Linux*
  • Microsoft Windows* 10
  • Inteligência Artificial
  • C/C++
  • Python*
  • Principiante
  • Intermediário
  • Intel® Parallel Studio XE
  • Intel® VTune™ Amplifier
  • VTune
  • TensorFlow
  • timeline
  • JSON
  • Depuração
  • Ferramentas de desenvolvimento
  • Aprendizado de máquina
  • Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

    Finding BIOS Vulnerabilities With Excite

    Finding vulnerabilities in code is part of the constant security game between attackers and defenders. An attacker only needs to find one opening to be successful, while a defender needs to search for and plug all or at least most of the holes in a system. Thus, a defender needs more effective tools than the attacker to come out ahead.

    Assine o Estudo de caso